Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
- Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
- Qian YangCornell UniversityVerified email at cornell.edu
- Sarah FoxCarnegie Mellon UniversityVerified email at cmu.edu
- Noura HowellDigital Media, Georgia TechVerified email at gatech.edu
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Ellen Van WykJPL NASAVerified email at jpl.nasa.gov
- J.D. Zamfirescu-PereiraUC BerkeleyVerified email at alum.mit.edu
- Bjoern HartmannAssociate Professor of EECS, University of California, BerkeleyVerified email at eecs.berkeley.edu
- Vera KhovanskayaUniversity of TorontoVerified email at utoronto.ca
- Marie Louise Juul SøndergaardPostdoctoral Researcher, AHO The Oslo School of Architecture and DesignVerified email at aho.no
- Steven J. JacksonProfessor of Information Science and Science and Technology Studies, Cornell UniversityVerified email at cornell.edu
- Michael A. MadaioGoogle ResearchVerified email at google.com
- BF SchulteVerified email at ucl.ac.uk
- Chris ElsdenChancellor's Fellow, University of EdinburghVerified email at ed.ac.uk
- Joshua KrollNaval Postgraduate SchoolVerified email at nps.edu
- Nitin KohliUC BerkeleyVerified email at berkeley.edu
- Franchesca SpektorPhD Student, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Phoebe SengersProfessor, Information Science and Science & Technology Studies, CornellVerified email at infosci.cornell.edu